Sign up to receive free email alerts when patent applications with chosen keywords are publishedSIGN UP

Abstract:

Methods and systems provide a USB memory stick protected by an attached
CIK. This system includes a USB memory stick composed of a main body and
a cap. The main body houses the memory for data storage as well as the
encrypt/decrypt device and ancillary circuitry. The cap houses the CIK,
simultaneously providing a storage mechanism for the CIK as well as
keeping the CIK obscured from plain view and visual detection.

Claims:

1. A system for a USB drive with a cryptographic ignition key,
comprising: the USB drive configured to be activated by the cryptographic
ignition key; and the cryptographic ignition key configured to connect to
the USB drive and activate the USB drive.

2. The system of claim 1, wherein the USB drive does not activate without
the cryptographic ignition key.

3. The system of claim 1, further comprising a cap for the USB drive,
wherein the cap comprises the cryptographic ignition key.

4. The system of claim 3, wherein the cap is configured to be placed on
the front of the USB drive and the back of the USB drive, and engage the
cryptographic ignition key with the USB drive when placed on the back of
the USB drive.

5. The system of claim 4, wherein the cap stores the cryptographic
ignition key when placed on the front of the USB drive.

6. The system of claim 1, further comprising: the USB drive comprising a
connector to connect the cryptographic ignition key to the USB drive; and
the cryptographic ignition key configured to connect to the USB drive via
the connector.

7. The system of claim 1, wherein data on the USB drive is encrypted and
the cryptographic ignition key activates decryption of the encrypted
data.

8. A USB drive for use with a cryptographic ignition key, comprising: the
USB drive configured to be activated by the cryptographic ignition key
and comprising a connector configured to connect to the cryptographic
ignition key configured to activate the USB drive, wherein the USB drive
does not activate without the cryptographic ignition key.

9. A cryptographic ignition key, comprising: the cryptographic ignition
key configured to connect to a USB drive and activate the USB drive upon
connection, comprising a connector configured to connect to a USB drive.

10. A method in a data processing system for a USB drive with a
cryptographic ignition key, comprising: connecting a USB drive configured
to be activated by the cryptographic ignition key to the cryptographic
ignition key; and activating the USB drive in response to the connection
with the cryptographic ignition key.

11. The method of claim 10, further comprising placing a cap comprising
the cryptographic ignition key on the USB drive.

12. The method of claim 10, further comprising removing the cap from a
front of the USB drive, and placing the cap on the back of the USB drive
thereby engaging the cryptographic ignition key with the USB drive.

13. The method of claim 10, wherein data on the USB drive is encrypted
and the method further comprises activating decryption of the encrypted
data upon the engagement of the cryptographic ignition key with the USB
drive.

14. The method of claim 10, further comprising removing the cap from the
USB drive, thereby disengaging the cryptographic ignition key from the
USB drive and deactivating the USB drive.

Description:

[0001] This generally relates to crypto ignition keys, and more
specifically relates to a crypto ignition key for use with a USB drive.

BACKGROUND

[0002] A crypto ignition key ("CIK") is a device or electronic key used to
unlock the secure mode of crypto-equipment. Conventional crypto ignition
keys provide a level of authentication prior to allowing a user access to
use the equipment protected by the CIK by requiring that the CIK be read
by the system and authenticated prior to operation of the protected
equipment.

[0003] Conventional CIKs are held separately from the protected equipment
and typically only connected to the protected equipment when the user
desires to operate the protected equipment. When a user wishes to render
protected equipment non-operational, the CIK is removed.

[0004] Conventional CIKs come in various shapes and sizes, but most are no
larger than a traditional lock key. The combination of the small size of
conventional CIKs and their being held separately from the protected
equipment make them relatively easy to lose or otherwise misplace. Once a
CIK is lost, the protected equipment is unusable until the CIK is found
or replaced.

[0005] Conventional USB memory sticks comprise a flash memory data storage
device integrated with a Universal Serial Bus ("USB") interface. USB
flash drives are typically removable and rewritable, and physically much
smaller than a floppy disk, CD, or DVD. They have large storage
capacities and may, for example combine allowance of up to 1 million
write or erase cycles with up to a 10-year data retention cycle.
Conventional USB memory sticks are used in a wide variety of ways. They
may be employed for personal data transport, to transfer recovery and
antivirus software to infected PCs, to carry applications so they can be
run on a host computer without installation, or to backup entire
databases. Some system and network administrators load them with
configuration information and software used for system maintenance,
troubleshooting and recovery. Bootable USB memory sticks may be used to
allow launch of an operating system. Because of the breadth and value of
information stored on conventional USB memory sticks, securing and
limiting access to this information is desirable.

[0006] Accordingly, there is a desire for a solution to these and other
related problems.

SUMMARY

[0007] In accordance with methods and systems consistent with the present
invention, a system is provided for a USB drive with a cryptographic
ignition key, comprising the USB drive configured to be activated by the
cryptographic ignition key. The system further comprises the
cryptographic ignition key configured to connect to the USB drive and
activate the USB drive.

[0008] In one implementation, a USB drive for use with a cryptographic
ignition key is provided, comprising the USB drive configured to be
activated by the cryptographic ignition key and comprising a connector
configured to connect to the cryptographic ignition key configured to
activate the USB drive, wherein the USB drive does not activate without
the cryptographic ignition key.

[0009] In another implementation, a cryptographic ignition key is provided
comprising the cryptographic ignition key configured to connect to a USB
drive and activate the USB drive upon connection. The cryptographic
ignition key comprises a connector configured to connect to a USB drive.

[0010] In yet another implementation, a method in a data processing system
for a USB drive with a cryptographic ignition key is provided, comprising
connecting a USB drive configured to be activated by the cryptographic
ignition key to the cryptographic ignition key. The method further
comprises activating the USB drive in response to the connection with the
cryptographic ignition key.

BRIEF DESCRIPTION OF THE DRAWINGS

[0011]FIG. 1 illustrates an exemplary embodiment of a USB memory stick
and cap with an integrated crypto ignition key made in accordance with
methods and systems consistent with the present invention.

[0012]FIG. 2 depicts another exemplary embodiment of a USB memory stick
and cap with an integrated crypto ignition key in accordance with methods
and systems consistent with the present invention.

[0013]FIG. 3 depicts steps in an exemplary method for use of a USB memory
stick and cap with an integrated crypto ignition key in accordance with
methods and systems consistent with the present invention.

DETAILED DESCRIPTION

[0014] Methods and systems in accordance with the present invention
provide a USB memory stick protected by an attached CIK. This system
includes a USB memory stick composed of a main body and a cap. The main
body houses the memory for data storage as well as the encrypt/decrypt
device and ancillary circuitry. The cap houses the CIK, simultaneously
providing a storage mechanism for the CIK as well as keeping the CIK
obscured from plain view and visual detection.

[0015]FIG. 1 illustrates an exemplary embodiment of a USB memory stick
and cap with an integrated crypto ignition key made in accordance with
methods and systems consistent with the present invention. USB Memory
Stick 100 comprises USB Memory Stick Body 102 and USB Memory Stick Cap
104. USB Memory Stick Body 102 houses the memory for data storage, the
encrypt/decrypt device, and the ancillary circuitry and other electronic
components of USB Memory Stick 100. In the embodiment shown in FIG. 1,
USB Memory Stick 100 is in the stored position, with USB Memory Stick Cap
104 placed over USB Connector 106, which may be used to connect USB
Memory Stick 100 to any device with a USB port, for example by plugging
USB Connector 106 into a USB port.

[0016] CIK 108 forms part of the activation mechanism for USB Memory Stick
100. In some embodiments, CIK 108 may be built into the inside of USB
Memory Stick Cap 104. This allows for CIK 108 to be easily stored and
located while simultaneously keeping CIK 108 hidden within the cap so
that it is not easily visible during either storage or activation of USB
Memory Stick 100. In the embodiment shown in FIG. 1, wherein USB Memory
Stick Cap 104 is in the storage position, covering USB Connector 106, CIK
108 is not connected to USB Memory Stick 100, which is thus rendered
inactive.

[0017]FIG. 2 depicts another exemplary embodiment of a USB memory stick
and cap with an integrated crypto ignition key in accordance with methods
and systems consistent with the present invention. In the embodiment
shown in FIG. 2, USB Memory Stick 100 is in the activated position, with
USB Memory Stick Cap 104 removed from over USB Connector 106, and placed
on the distal end of USB Memory Stick 100. CIK 108 is housed inside USB
Memory Stick Cap 104. In the embodiment shown in FIG. 2, wherein USB
Memory Stick Cap 104 is in the activated position, on the distal end of
USB Memory Stick 100, CIK 108 is thereby inserted into a slot located on
USB Memory Stick Body 102, activating USB Memory Stick 100.

[0018]FIG. 3 depicts steps in an exemplary method for use of a USB memory
stick and cap with an integrated crypto ignition key in accordance with
methods and systems consistent with the present invention. First, the
user may remove USB Memory Stick Cap 104, containing CIK 108, from the
USB Memory Stick 100 if it is in the storage position (step 300). Next,
the user may place USB Memory Stick Cap 104 on the distal end of USB
Memory Stick 100 so that CIK 108 is inserted into a slot located on USB
Memory Stick Body 102, thereby activating USB Memory Stick 100 (step
302). The activated USB Memory Stick 100 may then be plugged into any USB
port, for example the USB port on a computer (step 304). Once the USB
Memory Stick 100 is plugged into a USB port, the encrypt/decrypt device
resident in the USB Memory Stick Body 102 authenticates the CIK device
108 (step 306). If authentication is successful (step 308), the
encrypt/decrypt device allows access (read, write, erase, etc.) (step
310) to the secured data resident in the memory of the USB Memory Stick
100. If the authentication process is not successful (step 308), the
encrypt/decrypt device prevents access to the memory (step 312). Once the
user has finished using USB Memory Stick 100, it may be unplugged from
the computer and deactivated by removing USB Memory Stick Cap 104 from
the distal end of USB Memory Stick 100 so that CIK 108 is removed from
the slot located on USB Memory Stick Body 102 (step 314). Finally, the
user may restore USB Memory Stick Cap 104 to the storage position by
placing it on USB Memory Stick 100 so that it covers USB Connector 106
(step 316).

[0019] The foregoing description of various embodiments provides
illustration and description, but is not intended to be exhaustive or to
limit the invention to the precise form disclosed. Modifications and
variations are possible in light of the above teachings or may be
acquired from practice in accordance with the present invention. It is to
be understood that the invention is intended to cover various
modifications and equivalent arrangements included within the spirit and
scope of the appended claims.

Patent applications in class SYSTEM ACCESS CONTROL BASED ON USER IDENTIFICATION BY CRYPTOGRAPHY

Patent applications in all subclasses SYSTEM ACCESS CONTROL BASED ON USER IDENTIFICATION BY CRYPTOGRAPHY